<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xerte Online Toolkits (&lt;= 3.15) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/xerte-online-toolkits--3.15/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/xerte-online-toolkits--3.15/feed.xml" rel="self" type="application/rss+xml"/><item><title>Xerte Online Toolkits Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xerte-path-traversal/</guid><description>Xerte Online Toolkits 3.15 and earlier are vulnerable to relative path traversal, allowing attackers to move files and potentially achieve remote code execution.</description><content:encoded><![CDATA[<p>Xerte Online Toolkits, a tool used to create online learning materials, is vulnerable to a path traversal vulnerability (CVE-2026-34414) in versions 3.15 and earlier. The vulnerability exists in the elFinder connector endpoint at <code>/editor/elfinder/php/connector.php</code>. The <code>name</code> parameter within rename commands is not properly sanitized, allowing attackers to use directory traversal sequences (e.g., <code>../</code>) to manipulate file locations. This flaw can be exploited to overwrite application files, inject stored cross-site scripting (XSS), or, when combined with other vulnerabilities, achieve unauthenticated remote code execution (RCE). This poses a significant threat to organizations utilizing affected versions of Xerte Online Toolkits, potentially leading to data breaches, system compromise, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Xerte Online Toolkits instance running version 3.15 or earlier.</li>
<li>The attacker crafts a malicious HTTP request to <code>/editor/elfinder/php/connector.php</code> targeting the rename command.</li>
<li>Within the request, the <code>name</code> parameter contains directory traversal sequences (e.g., <code>../../</code>) and the desired destination path.</li>
<li>The server, due to insufficient input validation, processes the request without properly sanitizing the <code>name</code> parameter.</li>
<li>The attacker moves a file (e.g., an uploaded image or media file) from its original project media directory to a new location specified within the malicious <code>name</code> parameter. This could involve moving a file to the application root directory.</li>
<li>If the attacker moves a specifically crafted PHP file to the application root and the webserver is configured to execute PHP files in the root, the attacker can then access this file via a web request.</li>
<li>The attacker executes arbitrary code on the server.</li>
<li>The attacker gains complete control of the Xerte Online Toolkits instance and potentially the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical consequences. Attackers can overwrite sensitive application files, leading to denial of service or system instability. The injection of malicious JavaScript code can result in stored cross-site scripting (XSS) attacks, compromising user accounts and data. The most severe outcome is unauthenticated remote code execution (RCE), enabling attackers to gain complete control over the affected server, potentially leading to data breaches, malware deployment, and further lateral movement within the network. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high level of risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Xerte Online Toolkits to a version greater than 3.15 to patch CVE-2026-34414.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Path Traversal in Xerte Connector</code> to identify attempted exploitation of the path traversal vulnerability by monitoring requests to <code>/editor/elfinder/php/connector.php</code> with directory traversal sequences.</li>
<li>Implement input validation and sanitization on the <code>name</code> parameter within the elFinder connector to prevent path traversal attacks.</li>
<li>Review web server configurations to prevent the execution of PHP files from the web root directory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>remote-code-execution</category><category>xss</category></item></channel></rss>